aboutsummaryrefslogtreecommitdiff
path: root/API/Extensions/ConfigureJWT.cs
blob: 22ada983e684b251b90983c6770ea24064e09465 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
using System.Text;
using System.Threading.Tasks;
using Data.Models.Options;
using Microsoft.AspNetCore.Authentication.JwtBearer;
using Microsoft.Extensions.Configuration;
using Microsoft.Extensions.DependencyInjection;
using Microsoft.IdentityModel.Tokens;

namespace API.Extensions
{
	public static class JWTExtensions
	{
		public static void JWTConfiguration(this IServiceCollection services, IConfiguration configuration)
		{
			services.AddSingleton(new JWTOptions(configuration
						.GetSection("AppSettings")
						.GetSection("Secret")
						.Value));

			// Get key from appsettings.json
			var key = Encoding.ASCII.GetBytes(configuration
						.GetSection("AppSettings")
						.GetSection("Secret")
						.Value);

			// Setup Jwt Authentication
			services.AddAuthentication(x =>
			{
				x.DefaultAuthenticateScheme = JwtBearerDefaults.AuthenticationScheme;
				x.DefaultChallengeScheme = JwtBearerDefaults.AuthenticationScheme;
			})
			.AddJwtBearer(x =>
			{
				x.Events = new JwtBearerEvents
				{
					OnTokenValidated = context =>
					{
						// TODO: add more authentication
						return Task.CompletedTask;
					}
				};
				x.RequireHttpsMetadata = false;
				x.SaveToken = true;
				x.TokenValidationParameters = new TokenValidationParameters
				{
					ValidateIssuerSigningKey = true,
					IssuerSigningKey = new SymmetricSecurityKey(key),
					ValidateIssuer = false,
					ValidateAudience = false
				};
			});
		}
	}
}